This page provides configuration details for Cassandra collectors.
To monitor Cassandra with Database Visibility, you must be running version:
|
Field | Description | ||
---|---|---|---|
Create New Collector | Database Type | The Database type that you want to monitor. | |
Agent | The Database Agent that manages the collector. | ||
Collector Name | The name you want to identify the collector by. | ||
Connection Details | Hostname or IP Address | The hostname or IP address of the machine that your database is running on. | |
Listener Port | The TCP/IP address of the port on which your database communicates with the Database Agent. | ||
JMX Port | The port to remotely connect through JMX (optional for DSE Cassandra). See JMX Configurations. | ||
JMX Username | The name of the JMX user who is connecting to and monitoring the database using the Database Agent. See JMX configurations. | ||
JMX Password | The password of the JMX user who is connecting to and monitoring the database through the Database Agent. | ||
Username and Password | Username | The name of the user who is connecting to and monitoring the database using the Database Agent. The user must have the permissions described in: | |
Password | The password of the user who is connecting to and monitoring the database through the Database Agent. | ||
CyberArk | Click to enable CyberArk for database username and password. When CyberArk is enabled, information about Application, Safe, Folder, and Object is required to fetch the username and password for your database. To use CyberArk with Database Visibility, you must download the JavaPasswordSDK.jar file from the CyberArk website and rename the file to cyberark-sdk-9.5.jar. Then, you must copy the JAR file to the lib directory of the database agent zip file. | ||
Advanced Options | SSL Connection | Click to enable SSL Connection:
If you also use client certificate authentication, then click the Enable SSL Client Authentication box.
You can set the context protocol for the SSL environment using the These platforms support TLSv1.3:
| |
Monitor Operating Systems | See Configure the Database Agent to Monitor Server Hardware. |
These are the required configurations:
cassandra-env.sh
file.local connection, under the if [ "$LOCAL_JMX" = "yes" ]; then statement, set:
JVM_OPTS="$JVM_OPTS -Dcom.sun.management.jmxremote.authenticate=true" |
for remote connection, under the corresponding else statement, set:
JVM_OPTS="$JVM_OPTS -Dcom.sun.management.jmxremote.authenticate=true" |
Set the path to the credentials file, jmxremote.password
:
JVM_OPTS="$JVM_OPTS -Dcom.sun.management.jmxremote.password.file=PATH TO FILE" |
In the jmxremote.password
file, set JMX credentials to be the same as that of the database user credentials to be specified in the collector configuration:
username password |
You may choose to give ReadOnly JMX access to the database monitoring user by defining in the |
If DB and JMX have different SSL key stores, use:
Run command:
To monitor the JMX SSL-enabled Cassandra database, add the following properties:
If you are using a single Database Agent to monitor multiple Cassandra clusters where each Cassandra cluster has different root CAs. Then, to monitor these Cassandra clusters with different keystore credentials, create one trust store that contains all root CAs of Cassandra clusters and Controller certificates. For example, to import two root CAs, run the following command:
For more information, see Enable SSL and SSH for Database Agent Communications. If you cannot create a single trust store, use different Database Agents while monitoring different Cassandra clusters. |